8:00 a.m.
Registration, Continental Breakfast & Exhibits
8:30 a.m.
Chairperson's Welcome:
Virtual Identity Analysis Through The VITAL Framework
Online activities can reveal a substantial amount of personal information -- individuals leave identifying data across dozens, if not hundreds of sites. While it is difficult to gain visibility into every element of an individual’s online persona, employers may be liable if employees engage in problematic online activities. This presentation will help to define the challenge, and discuss possible solutions, through the cutting edge v-ID1 database and the VITAL framework.
You'll get a glimpse at the future of the biometrics world from this top-rated leading
industry expert!
Samir Nanavati, Partner
IBG
|
^BACK TO TOP |
9:30 a.m.
Speed Networking
Become acquainted with your fellow attendees in this informative and fast-paced forum!
|
^BACK TO TOP |
10:00 a.m.
Morning Refreshment, Networking Break & Exhibits
We encourage you to visit the participating exhibitor booths as you enjoy complimentary refreshments.
10:30 a.m.
Understanding How Face And Ocular Biometrics Can Benefit Your Organization In Non-Ideal, Unconstrained Scenarios
Face and ocular biometrics have made considerable progress over the past decade allowing for a more efficient and seamless implementation. The common pitfall involved with facial recognition was that people had difficulty comparing two face images and determining if they pertained to the same identity. Recent research has examined the possibility of performing automated face recognition in non-ideal, unconstrained scenarios. This includes recognizing individuals in a nighttime environment; processing face images that are severely degraded; or matching faces that have undergone plastic surgery, thus making the success rate of matching two images much higher.
Ocular biometrics has predominantly been based on the iris - the colored portion of the human eye. This technology has been seen as problematic when the iris is not directly in front of the camera resulting in an off-axis image. However, recent research has explored the possibility of using periocular skin texture (surrounding the eye) and scleral patterns (white of the eye) as additional biometric cues. The periocular region becomes particularly relevant in low quality ocular images where the iris may not be easily discernible.
This session will provide you with updated information on the progression of face and ocular biometrics allowing you to understand how and why they can benefit your organization, including:
- How to successfully implement facial recognition in nighttime environments
- Processing severely degraded face images
- Understanding the impact of plastic surgery on the biometrics industry
- The importance of periocular biometrics
- Using the sclera as a biometric trait
Arun Ross, Associate Professor
WEST VIRGINIA UNIVERSITY |
^BACK TO TOP |
11:15 a.m.
Implementing An Advanced Biometric System To Prevent Fraud And Protect Privacy: One System That Includes Ease Of Use, Speed, Accuracy, Reliability, Security And Privacy
Pearson VUE is the global leader in computer-based testing, delivering millions of high-stakes exams each year for clients in the licensure, certification, academic admissions, regulatory, and government markets. In order to accurately and rapidly identify large numbers of test takers and thwart attempts at impersonation, Pearson VUE needed to implement an advanced biometric system. A system that with real-time 1:N matching capabilities, utilizing palm vein identification technologies that that include an ease of use, speed, accuracy, reliability, security and privacy.
The Graduate Management Admission Council (GMAC), owner of the GMAT exam used for business school admissions was one of the first to integrate this new biometric system. As the system was rolled out, GMAC saw immediate results in the detection and prevention of proxy testing fraud. Building on this success, GMAC became the first organization to receive authorization from the French privacy authority, the CNIL, to process biometric data in France.
This session will examine the phased approach taken to design, develop and roll out a biometric system that will allow you to prevent fraud and protect privacy, including:
- Designing and adapting a system in response to evolving stakeholder needs
- Juggling advances in technology that became available during the course of an ongoing project
- Understanding the balance that must be struck between security, privacy and usability
- Proper ways to address legal, cultural and logistical issues
Daniel Eyob, Director, GMAT Test Security
GRADUATE MANAGEMENT ADMISSION COUNCIL
Mark Poole, Product Strategist
PEARSON VUE |
^BACK TO TOP |
12:00 p.m.
Lunch On Your Own -- But Not Alone!
Join a group of your colleagues for a themed lunch with an informal discussion surrounding a specific topic. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing biometrics concerns.
1:30 p.m.
Using Biometrics In Everyday Consumer Applications – Considerations And Expectations
This interactive panel of IT leaders from household name companies will discuss their experiences with introducing fingerprint biometrics into traditionally ID card-based identity processes, the benefits of doing so, and the lessons learned along the way. These Healthcare, Retail, and Consumer identity scenarios will provide you with a strong cross section of what to consider, and what to expect, when introducing this breakthrough technology into the mainstream of your business processes.
Moderator:
Jim Sullivan, Vice President of Strategy and Business Development
BIO-KEY INTERNATIONAL, INC.
Panelists:
Eric Schulties, CIO
INSTITUTE FOR TRANSFUSION MEDICINE (ITxM)
More Panelists To Be Announced!
|
^BACK TO TOP |
2:30 p.m.
How To Successfully Balance Personnel, Policy And Technologies In An Economically Challenged Era
The ever-changing realm of security access control and technology has challenged budgets and return on investments. Leaders are now coping with the challenge of balancing manpower, technologies and reduced budgets. Policies and procedures used in balancing these efforts will become a key to ensuring security operates at an optimum level while ensuring the mission, infrastructure and people involved are protected.
This session will provide you with insight on key issues to be taken into account when considering your own large-scale implementation of biometric technologies, including:
- An overview of a number of technological challenges to educate your security professionals on to ensure success
- Understanding your organization's needs and whether or not technology investments are right for you
- How to gain organizational buy-in into technology investments
Jeffrey Jones, Director, Mission Assurance (Infrastructure Protection and Security)
U.S. NAVY |
^BACK TO TOP |
3:15 p.m.
Afternoon Refreshment, Networking Break & Exhibits |
^BACK TO TOP |
3:35 p.m.
The Future Of Maintaining Security During Sensitive Or High-Value Activities:
Why One Company Is Now Capturing Fingerprints From iPad Users
A pharmaceutical company, name to soon be released, has been maintaining security in their SAP system over the years in a traditional way. A key element was to introduce an identity management and user authentication/re-authentication when sensitive or high-value activities were performed in SAP, especially within the Procure2Pay cycle. By introducing this new security process they were going to need to indulge in new biometric activity.
Using standard biometric USB devices, and a third-party software system called bioLock integrated with SAP, the organization was able to control activities such as the approval of high-dollar purchase orders as well as other functions inside the system which are locked down with biometrics to prevent fraud and establish clear accountability inside the SAP ERP system.
This session will provide you with first-hand experience of using fingerprints on iPads in order to track and control activities by employees. You will hear how this decision came about, how the process was put into motion, and how you, too, can make the move into the future of maintaining security in sensitive, high-value activities, including how to:
- Establish true biometric authentication inside an ERP system
- Enable biometric controls of functions and values inside your system
- Establish true segregation of duties using biometrics
- Prevent insider fraud and provide true accountability
- Use dual biometric approvals to control authorized users
Thomas Neudenberger, Chief Operations Officer
REALTIME NORTH AMERICA
4:20 p.m.
Day One Wrap-Up
Samir Nanavati, Partner
IBG |
^BACK TO TOP |
4:30 p.m.
End Of Day One |
^BACK TO TOP |
4:45 p.m.
Networking Reception, Tour Of IBG New York Headquarters & Hands On Demonstrations Of The Latest Biometric Tools: Please Join Us!
We invite you to join us for a drink as you relax with your peers and enjoy hands on demonstrations of the latest a biometric tools at the IBG New York City headquarters. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas and gain insight into what’s next in biometrics over complimentary drinks!
|
6:00 p.m.
Dine Around
Sign up during the day for dinner with a group. Take advantage of New York's fine dining while you continue to network with your colleagues.
“Good discussions and interactions.”
PAST BIOMETRICS SUMMIT ATTENDEE
“Very useful content for me.”
PAST BIOMETRICS SUMMIT ATTENDEE
Make the most of your time out of the office.
Attend your choice of our hands-on post-conference workshops.
|
^BACK TO TOP |
Speakers & Key Highlights • Who Will Attend • Benefits of Attending • Rave Reviews
Interactive Workshops • Agenda Day 1 • Agenda Day 2
Venue & Lodging • Registration Fees • Discounts & Policies • Conference Supporters
Register Now • Forward To A Colleague |
|